|Publication number||US7780081 B1|
|Application number||US 11/305,993|
|Publication date||Aug 24, 2010|
|Filing date||Dec 17, 2005|
|Priority date||Jan 3, 2005|
|Publication number||11305993, 305993, US 7780081 B1, US 7780081B1, US-B1-7780081, US7780081 B1, US7780081B1|
|Inventors||Robert C. Liang|
|Original Assignee||RCL Products, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (12), Referenced by (45), Classifications (8), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present Utility patent application claims priority benefit of the U.S. provisional application for patent No. 60/641,287 filed Jan. 3, 2005 under 35 U.S.C. 119(e).
The present invention relates generally to product/property protection, real time inventory tracking and shopping checkout systems. More particularly, the invention relates to automated self-checkout systems.
Shopping for products and goods at large warehouse and department stores has grown in popularity. Many attempts have been made to improve the flow of customers and products through these stores. Under conventional product checkout methods, the customer must wait in long lines and suffer the “bottle neck” effect at the checkout counter.
Recently stores have tried to reduce the “bottle neck” effect by introducing “self check-out” schemes that incorporate scanners to allow customers to checkout their own merchandise. These new schemes have had limited success and do not adequately improve shopping cart checkout efficiency. Long checkout lines still exist during peak hours.
Yet another problem with current checkout methods is the lack of adequate security measures. Some stores provide security tags on each product. Store personnel must deactivate security tags before a customer leaves the store. If the security tag is not deactivated and a person attempts to remove a product from the store, an alarm will sound. In yet other cases, stores that do not have security tags must lock up expensive products in a protected cabinet and have an attendant unlock the cabinet when a customer shows interest. These methods of product security are inefficient and require the intervention of store personnel.
In view of the foregoing, there is a need for improved techniques that provide automatic product recognition, product security and efficient checkout of products before a customer leaves the store.
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Unless otherwise indicated illustrations in the figures are not necessarily drawn to scale.
To achieve the forgoing and other objects and in accordance with the purpose of the invention, a variety of techniques for product/property security protection, inventory tracking and shopping cart checkout are described.
A system for security protection, inventory tracking and shopping cart checkout is provided that includes steps and/or means for registering a product at a vendor retail premises that has been taken from its storage or display location, steps and/or means for registering that the product has been put into a customer's shopping cart, steps and/or means for automatically transacting a purchase of the product, steps and/or means for paying for the product; and steps and/or means for notifying the customer to pay if the product has not been properly or timely paid for.
Some embodiments may further include any combination of: steps and/or means for tracking products within the vendor's premises; steps and/or means for alerting a security guard representative or system of a person and/or product that is being removed from the vendor location without being paid for; steps and/or real-time means for accounting for product inventory that is being tracked by the product tracking means; steps and/or means for tracking customers and customer's location within the vendor's premises; steps and/or means for uniquely identifying at least one customer within the vendor's premises; and/or steps and/or means for exchanging a customer's credit card deposit or secured money deposit with a token that may be used in the payment means.
In another embodiment of the present invention, a system for premises security is described that includes means for tracking and registering at least one unauthorized person within the premises, means for tracking and registering the unauthorized removal of at least one item within the premises, and means for alerting a security guard representative or system of an unauthorized person and/or unauthorized item removal based on said person and/or item tracking means.
Other features, advantages, and object of the present invention will become more apparent and be more readily understood from the following detailed description, which should be read in conjunction with the accompanying drawings.
The present invention is best understood by reference to the detailed figures and description set forth herein.
Embodiments of the invention are discussed below with reference to the Figures. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments.
In one embodiment of the present invention, the system for product protection and identification may use many types of computerized functions available on the market today. Some of the system functions include but are not limited to wireless communication technologies such as Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN) that may include Bluetooth, Infrared-irDA and NFC-near field communications. Other wireless networks and protocols such as Wireless Fidelity (WI-FI) may also be used between the customer and computers. The present invention may also include Electronic Article Surveillance (EAS) tags, Global Positioning System (GPS) and Radio Frequency Identification (RFID).
After receiving the cart at 100, the customer makes a choice at 102 to either pay by cash/check or by credit card. If the customer decides to pay by cash/check they can be offered incentives or an application for a store credit card or “token” at 104. If the customer pays by credit card, their card will be scanned. The customer starts the shopping process by turning on the shopping cart computer at 106. The cart computer now begins to communicate with the store computer. In some embodiments of the present invention, when turned on, the cart computer will take the customer's picture at 108 for identification and send it to the store computer with a time stamp at 116.
The customer begins shopping by selecting store products, scanning the product bar code with the cart bar code reader, weighing the product and taking the product picture with the cart's digital camera at 110. The cart computer will transfer product information along with product weight at 112 to the store computer and include a digital time stamp at 116. The store computer at 116 contains product information on every item in the store that includes but is not be limited to 2D or 3D pictures, weight of each product and quantity of each product in the cart. The store computer preferably maintains suitably accurate time (e.g., without limitation, atomic time) for digital time stamps and data on special products residing on weight scale sensors throughout the store. Some embodiments of this invention will have the ability to present a digitized voice to the customer. By way of example, without limitation, the cart computer could use the digitized voice to instruct the customer at 114 to put the product in the cart.
During the shopping process, a customer may decide to purchase a product by placing it in the cart at 118 or they may remove a product from the cart. Each time a product is inserted or removed from the cart at 118 electronic devices on the shopping cart detect weight differences and record these differences with the store computer. If a customer removes a product from the cart at 120, the cart computer will attempt to identify the removed item by comparing product weights at 122 that have been previously placed in the shopping cart. When the cart computer determines which product was removed at 122 it updates the store computer with a time stamp at 116. Both the cart and store computers are updated after each transaction and the information is echoed back to the customer using voice messaging at 126. Each time a customer selects another store product, the product weight is accumulated at 124, recorded by the cart computer and transferred back to the store computer at 126. Mechanisms in the shopping cart continue to monitor the customer's shopping process at 128 until the customer has completed selecting products at 110 and moves the cart to the checkout line.
The customer may decide to go to a semi-automatic lane at 136 to checkout their merchandise. In this case they would remove each product from the electronic shopping cart and scan each bar code one by one. After scanning, the customer would transfer the product to a conveyer belt. Alternatively, the customer could place each product on the checkout platform and the semi-automatic lane could weigh, scan and photograph each item at 136. After all the merchandise has been identified and paid for, the semi-automatic lane will deactivate the EAS tags at 141. The customer can bag the merchandise and transfer it to a normal cart for removal from the store. The checkout transaction ends at 146 when the computer in the semi-automatic lane generates a receipt for the customer.
In another embodiment of the present invention, if customers want to buy only a few items and do not need a cart, they can approach an attendant to present cash/check, credit card, or any other suitable form of payment, including but not limited to, gift cards, smart cards, or ID chip “tokens”, etc., and be charged a small “deposit” in exchange for portable bar code reader and wireless communicating devices or any suitable device needed for the transaction. The “deposited” amount will be returned or accounted for with the purchases at the check out counter. By way of example, without limitation, the customer could be given a device such as an ID chip “token” that is password protected by the customer. The ID chip “token” could contain serialized numbers of each product at the store in its large memory. If the token is lost, while at the store, it can be replaced immediately. The customer would surrender the token when all its stored monetary value is used up. Alternatively, the ID chip “token” could be filled with a prepaid amount of money and reused each time the customer returns to the store.
In some implementations of the present invention, when checking in, besides signals input to the computer's memory automatically from motion sensors, weight platform in floor, digital camera, time of entry, laser beam interruption etc., by the customer when he/she enters the store, he/she may be greeted by a “welcome” person who will direct them to register to get the “shopping tools” on loan with deposits on their credit card or exchange with a “secured money” token. This token can replace “gift cards” as a more durable, portable “piggy bank” and safe. This check-in registration helps account for that person in the store during shopping hours. All public access rooms, including restrooms, also may include entry counting scheme for security reasons.
In yet another alternate embodiment of the present invention, the customer ID chip “token” could be used to account for payment on all purchases at the checkout counter. When the customer is ready to check out, they could present the “token” to the cashier. In turn, the cashier could connect the “token” to a computer interface “adapter” to communicate with the computer. The “token” could upload all purchase information to the computer so that any missed paid items, “deposits” to credit or debit from credit cards is done by the computer at this counter. When everything is accounted for, a receipt is issued for customer's signature (e.g., without limitation, manually or electronically) to finalize the transaction. The sales receipt can be used as proof of paid purchases and be presented to the “second” layer security “guard” to visually check the merchandise before it leaves the store. The use of a “token” will help to deter thefts and to further assist in balancing the store's inventory. In some alternative embodiments, the “token” is like a “gift card” but more capable; e.g., without limitation, it is reusable (money added or subtracted), customize and password secured. If lost, it is preferably replaceable, and for a person who finds it, it has no value or useful purpose. In some applications they can, however, return it to the store for small reward and recycle.
The customer begins the shopping process by selecting a store product and scanning the product's bar code with code reader 14. Simultaneously a camera 16 takes the product's picture and sends this information to the store computer 30 via wireless interface. The cart computer 22 may instruct the customer, using digitized voice, to put the product on weight platform 24 and then place it inside the cart. Now cart computer 22 can transmit the product weight information to store computer 30. In some embodiments, bar code reader 14 is a reflective bar code scanner that is wirelessly linked to store computer 30. Upon a successful bar code scan, cart computer 22 accepts the product with a sound such as a “beep” and then the consumer is instructed to place the product onto weight check platform 24. If the weight check is successful, cart computer 22 signals feedback with another “long beep” and the customer is instructed to transfer the product into the cart. When the customer selects the “buy” button on keypad 34 or presses one of the assigned keys on computer 22, the scanned and weighed product is considered “sold”. An accurate time stamp is also recorded. If the customer changes their mind and wants to return the product to the shelf, they can do so by taking the product out of the cart, scanning the barcode again and placing the product back on the shelf. When this occurs, the subtracted weight from scales 26 and 28, and recorded time of execution data are transmitted to the store computer 30. The store computer 30 will compare, identify and feedback information to camera screen 34 that a removed product has been “deleted” from the contents of shopping cart 10, audible communication means may also be used.
Normally, the weight and barcode are sufficient for the cart computer 22 to identify the exact product. However, to prevent fraud, or when weight information is in doubt, accurate and precise timing is another tool the computer can use to verify and identify the exact product. By way of example, without limitation, if two different products weigh the same, each product can be distinguished from one another because the exact time of each purchase was different. If two different products with the same weight are thrown into the cart at the same time without first being scanned, cart computer 22 may prompt the customer with digitized voice or audible beeps to rescan the products. In the case that the customer wants to buy or return one or more of the same product, or do something out of the ordinary, the cart computer 22 can prompt the customer via screen 32, and the customer can take appropriate actions to solve the problem.
When the customer is ready to checkout, they can roll the shopping cart 10 to weight all of the products including the cart on a weight platform 12. The store computer 30 will subtract the weight of the cart and if the weight of the products in the cart is correct, the customer proceeds to an automated checkout lane. If there is a recognizable weight difference, the cart computer 22 can give the customer feedback using the cart computer's screen or by prompting the customer using a digitized voice to proceed to a manual lane where the products in the cart can be scanned individually to check for missed or added items.
At the checkout counter, the clerk can upload the purchased product information from the customer's charge card and present them with a document for signature. At the same time the clerk can deactivate the EAS tag(s) affixed to the products, bag the products, and transfer the bagged products to a conventional cart not equipped with the present invention. The purchase is automatically charged to the credit card that was scanned into credit card scanner 20 and then the customer is given a receipt to sign at the final checkout. Customer information entered at the start of shopping, the picture ID taken by security camera 18, and the shopping cart check-in verification data, are recorded automatically by the cart computer and send through a wireless interface to the store computer 30.
In another embodiment of the present invention, the cart computer 22 may be implemented as any suitable mobile platform including, but not limited to, wireless computers such as personal data assistants (PDA), laptop, mobile phones with display, or video digital cameras. That is, any computer with a wireless communication means and a display with peripheral attachments are suitable to carryout the cart computer functions of the present invention.
After all the products are transferred to another cart, the customer signs a legal confirmation document. Before the customer receives a sales receipt, the customer uses scanner 64 to scan the shopping cart's bar code to confirm that the equipment stays in the store. Further security can be designed into the system by having the cart computer issue an audible beep to remind the customer to scan the cart's equipment bar code. The cart with the equipment must remain in the store to be used by new customers.
Given that shopping cart 10 is equipped with relatively expensive wireless equipment, some embodiments of the cart may be designed with GPS systems, EAS, and radio frequency identification (RFID), or other suitable security measures towards that would allow the store computer to constantly monitor the location of shopping cart 10. By way of example, without limitation, if shopping cart 10 had built in sensors such as those described above, it could trigger a store alarm if the shopping cart is moved to an outside door of the store.
The security system in
In some implementations of the present invention, after all the customer's purchased items have been accounted for at the checkout station, the receipt issued is to contain bar-coded ID of the customer. The “security guard” performs like a “thank you for shopping here” person (less intimidating, more friendly gesture), will scan the receipt's ID code wirelessly and account for customer as checking out, who will be deleted from the computer's memory and final conclusion of the transaction. This procedure is the “second” level of security when or if any items are not paid for, alert by computer to watch-out.
In another embodiment of the present invention and by way of an alternative example, without limitation, it may be preferable to design and build the UPS bar code scanner 616 along side with a camera 618 to capture the USID number both at the same time and process by computer software. By this one action, the computer will feedback information 622 and confirmed this unique product the customer may want to buy. If so, the customer needs to do is to press “buy” button in a keypad 620 and the product is recorded paid for.
By way of another alternative example, without limitation, payment can be made using the customer's own cell phone or PDA or similar wireless device. The computer will accept this form of payment as long as the customer identification information is authentic and has been confirmed when they first enter the store.
With this embodiment of using multiple product identification such as hand approaching motion, proximity and/or touch sensors, product weight/location, exact time of event/purchase, the USID number of each same product, etc. and other identifiers as mentioned earlier, this process could save a lot of time. Since most of the products purchased had been self-checked out at point of product location by the customer and cross-checked by computer, speed at the checkout station can be gross checked only by visual, total weight checking and upload all customer's information to cross check against store's inventory and to issue itemized sale receipt with weight information (each item and total). Store clerk is to concentrate more on missed items and other discrepancy from store's inventory. Inventory is in real time.
The USID is contemplated to be a viable alternative to RFID, which USID is believed to be cheaper, effective, efficient, accountable and traceable. When products delivered to the store from manufacturer or supplier, each item is preferably numbered with a USID (unique serial identification). The USID can contain alphanumeric symbol, by way of example, and not limitation, the month, serial number and year. This serial numbering can be recycled and repeated when all that same item of products delivered have been sold. This USID is preferably to be placed in each item below or above the price and UPC of each item so it is easy to take picture and bar scan at the same time. The procedure is preferably made friendly, fast, easy to use, and fun to shop. The computer does the work of accounting for every item in the store, sold or otherwise with the aid of all the identification mentioned; e.g., USID, weight of the product, time of purchase, hand approaching product motion sensor, proximity/touch sensor, product location, image of the product/customer etc., to check, to counter check each item, and balance the inventory.
USID can be any way implemented: by using bar code, alphanumeric (as mentioned earlier), pure numbers, any symbols (Chinese, Greek or any language), or whatever characters that the computers have stored in its memory bank to be compared, matched, verified, identified and recognized.
The single common “synchronized” atomic clocking or timing of all events/purchases, by way of example, without limitation is one of the important tools in this invention. Other timing sources can be quartz oscillators or from any timing sources, but must reset and synchronize with all the shopping tools or equipments, at the beginning of the day for example, automatically.
Multiple RF trans-receiver “satellites” equipments are located at high corners of vendor's building. They are to be used to track customer's location. The customer's shopping cart or portable device (PD) is the “beacon”. It is like GPS but in localized scale.
In another embodiment of the present invention and by way of an alternative example, without limitation, the customer's location can be determined when he/she is approaching the “cubicle” or product location. The customer's unique ID shopping device's (assigned when first enter the store) emitting signal is picked up with the strongest by the trans-receiver (use in motion detector/laser) will be the customer's position. When the customer's approaching hand for the product triggered the sensor, the store computer now knows who got hold of what, where and when the product was taken. When the “4w's” is confirmed by store computer on the product, it is now ready for scanning to final homing in to the uniqueness of the product with USID and ready to purchase and accounted for. When weight is added for further identification, then “5w's” will definitely identify the exact product.
It is possible for the computer to recognize all of the three codes (price, USID and UPC bar code printed above or below to each other) at the same time of the product 615 from camera 618 photo image send wirelessly to be processed by software algorithms. Once the purchasing product is identified and recognized, the transaction is confirmed and feedback to the handheld device 624 use by the customer at the product location. When this wireless digital camera 618 can do the job alone, the bar code scanner 616 is no longer required or needed.
Those skilled in the art will further readily recognize improved or addition verification and identification checks beyond those already described above. By way of example, and not limitation, some embodiments may include sophisticated software algorithms to enhance product identity checks and to deduce the precise product purchased or removed and deleted from the customer's cart. By way of example, and not limitation, additional customer identity checks (beyond picture, social security number, password, token, etc.), including conventional biometric means such as information from a fingerprint reader, DNA, and retina scan, etc., for customer registration. It is contemplated that this kind of information can really speed payment for products, on checking in and checking out. It is contemplated that this kind of information can be adapted into the present invention to help against identity theft as well.
The present system may be designed to be very user friendly and fun to use with audio and video aids. Moreover, embodiments of the present invention are well suited for high-traffic, high volume retail/wholesale stores, grocery stores, club member stores and other high volume product stores.
In some embodiments, customers can order their desired product(s) thru the Internet by cell phone, laptop or any applicable communication device and then pick up their products or have them delivered directly to their home.
Those skilled in the art will readily recognize, in accordance with the teachings of the present invention, that any of the foregoing steps and/or system modules may be suitable replaced, reordered, removed and additional steps and/or system modules may be inserted depending upon the needs of the particular application, and that the systems of the present embodiment may be implemented using any of a wide variety of suitable processes and system modules, and is not limited to any particular computer hardware, software, firmware, microcode and the like.
CPU 702 may also be coupled to an interface 710 that connects to one or more input/output devices such as such as video monitors, track balls, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, or other well-known input devices such as, of course, other computers. Finally, CPU702 optionally may be coupled to an external device such as a database or a computer or telecommunications or internet network using an external connection as shown generally at 712. With such a connection, it is contemplated that the CPU might receive information from the network, or might output information to the network in the course of performing the method steps described in the teachings of the present invention.
Those skilled in the art will readily recognize, in accordance with the teachings of the present invention, that any of the foregoing steps and/or system modules may be suitably replaced, reordered, removed and additional steps and/or system modules may be inserted depending upon the needs of the particular application, and that the systems of the foregoing embodiments may be implemented using any of a wide variety of suitable processes and system modules, and is not limited to any particular computer hardware, software, middleware, firmware, microcode and the like.
Having fully described at least one embodiment of the present invention, other equivalent or alternative methods of implementing automated shopping cart checkout and security systems according to the present invention will be apparent to those skilled in the art. The invention has been described above by way of illustration, and the specific embodiments disclosed are not intended to limit the invention to the particular forms disclosed. The invention is thus to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the following claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5418354 *||Aug 20, 1993||May 23, 1995||Halling; Leonard W.||Self service cart system|
|US5635981 *||Jul 10, 1995||Jun 3, 1997||Ribacoff; Elie D.||Visitor identification system|
|US5918211 *||May 30, 1996||Jun 29, 1999||Retail Multimedia Corporation||Method and apparatus for promoting products and influencing consumer purchasing decisions at the point-of-purchase|
|US6659344 *||Dec 6, 2000||Dec 9, 2003||Ncr Corporation||Automated monitoring of activity of shoppers in a market|
|US6725206 *||Oct 1, 1999||Apr 20, 2004||Solbyung Coveley||Cashierless shopping store and components for use therein|
|US7337960 *||Feb 28, 2005||Mar 4, 2008||Evolution Robotics, Inc.||Systems and methods for merchandise automatic checkout|
|US20030144793 *||Jan 30, 2002||Jul 31, 2003||Comverse, Inc.||Wireless personalized self-service network|
|US20030200152 *||Apr 19, 2002||Oct 23, 2003||Computer Associates Think, Inc.||Wireless shopping system and method|
|US20040181463 *||Mar 25, 2004||Sep 16, 2004||Scott Goldthwaite||System and method for securely storing, generating, transferring and printing electronic prepaid vouchers|
|US20040252025 *||Apr 2, 2004||Dec 16, 2004||Silverbrook Research Pty Ltd.||Shopping receptacle with in-built scanner|
|US20050073416 *||Sep 19, 2003||Apr 7, 2005||International Business Machines Corporation||Using radio frequency identification to detect and/or prevent theft and shoplifting|
|US20050099298 *||Nov 10, 2003||May 12, 2005||Mercer Thomas C.||Algorithm for RFID security|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8146811 *||Mar 12, 2008||Apr 3, 2012||Stoplift, Inc.||Cart inspection for suspicious items|
|US8165349||Nov 29, 2008||Apr 24, 2012||International Business Machines Corporation||Analyzing repetitive sequential events|
|US8194129 *||Nov 30, 2007||Jun 5, 2012||MJK Holdings, LLC||Weight monitoring system for scrap and recycled materials|
|US8203459||May 4, 2009||Jun 19, 2012||MJK Holdings, LLC||Security systems and methods for continuously monitoring the weight of a container|
|US8261970 *||Apr 11, 2007||Sep 11, 2012||Junko Suginaka||Wireless payment system having long range crediting and short range payment approval|
|US8418919 *||Jan 4, 2011||Apr 16, 2013||Intellectual Ventures Fund 79 Llc||Apparatus and method for mobile checkout|
|US8430312 *||Apr 2, 2012||Apr 30, 2013||Stoplift, Inc.||Cart inspection for suspicious items|
|US8441365||Jun 14, 2012||May 14, 2013||Mjk Holding, Llc||Security systems and methods for continuously monitoring the weight of a container and determining a monetary value of the material therein|
|US8789757||Feb 2, 2011||Jul 29, 2014||Metrologic Instruments, Inc.||POS-based code symbol reading system with integrated scale base and system housing having an improved produce weight capturing surface design|
|US8822848||Sep 2, 2011||Sep 2, 2014||Metrologic Instruments, Inc.||Bioptical point of sale (POS) checkout system employing a retractable weigh platter support subsystem|
|US8825531 *||May 12, 2011||Sep 2, 2014||Ecr Software Corporation||Automated self-checkout system|
|US8849791 *||Jun 29, 2011||Sep 30, 2014||Amazon Technologies, Inc.||Assisted shopping|
|US8874471 *||Jan 29, 2013||Oct 28, 2014||Wal-Mart Stores, Inc.||Retail loss prevention using biometric data|
|US8977554||Dec 23, 2013||Mar 10, 2015||Amazon Technologies, Inc.||Assisted shopping server|
|US9019066 *||Aug 2, 2007||Apr 28, 2015||Ncr Corporation||Terminal|
|US9092773||Jun 30, 2012||Jul 28, 2015||At&T Intellectual Property I, L.P.||Generating and categorizing transaction records|
|US9165173 *||May 29, 2013||Oct 20, 2015||Ncr Corporation||Security method using an imaging barcode reader|
|US9240006 *||Nov 30, 2011||Jan 19, 2016||At&T Intellectual Property I, L.P.||Wireless transactions for enhancing customer experience|
|US20070106574 *||Nov 8, 2005||May 10, 2007||Kappel Thomas A||Inventory management system and method for a cellular communications system|
|US20080226129 *||Mar 12, 2008||Sep 18, 2008||Malay Kundu||Cart Inspection for Suspicious Items|
|US20090033489 *||Aug 2, 2007||Feb 5, 2009||Ncr Corporation||Terminal|
|US20090201369 *||Nov 30, 2007||Aug 13, 2009||Jones David H||Weight Monitoring System For Scrap And Recycled Materials|
|US20090228363 *||Feb 25, 2009||Sep 10, 2009||Yaniv Segev||Shopping system and method therefor|
|US20090261981 *||Oct 22, 2009||Mjk Holding, Llc||Weight monitoring systems and methods|
|US20100030685 *||Feb 4, 2010||Bobbitt Russell P||Transaction analysis|
|US20100044428 *||Apr 11, 2007||Feb 25, 2010||Junko Suginaka||Electronic payment system|
|US20100114623 *||Oct 31, 2008||May 6, 2010||International Business Machines Corporation||Using detailed process information at a point of sale|
|US20100135528 *||Nov 29, 2008||Jun 3, 2010||International Business Machines Corporation||Analyzing repetitive sequential events|
|US20100319064 *||Dec 16, 2010||Microsoft Corporation||Digital content acquisition system and techniques|
|US20110050002 *||Dec 10, 2008||Mar 3, 2011||Esmolo Ltd.||Energy supply system with a protected solar module|
|US20110084486 *||Oct 9, 2008||Apr 14, 2011||Mitsubishi Heavy Industries, Ltd.||Off-shore wind turbine generator and off-shore wind farm|
|US20120032804 *||Mar 31, 2010||Feb 9, 2012||Hw Verwaltungs Gmbh||System for the logistical monitoring and control of the flow of goods, their storage, storage and transportation conditions and consumption|
|US20120126981 *||Aug 26, 2011||May 24, 2012||TAG Company (UK) Ltd||Theft prevention system|
|US20120188377 *||Jul 26, 2012||Malay Kundu||Cart inspection for suspicious items|
|US20130138518 *||Nov 30, 2011||May 30, 2013||At&T Intellectual Property I, L.P.||Wireless Transactions for Enhancing Customer Experience|
|US20130151362 *||Dec 7, 2011||Jun 13, 2013||Nir Steel||System and Method of Express Purchasing|
|US20140211017 *||Jan 31, 2013||Jul 31, 2014||Wal-Mart Stores, Inc.||Linking an electronic receipt to a consumer in a retail store|
|US20140214568 *||Jan 29, 2013||Jul 31, 2014||Wal-Mart Stores, Inc.||Retail loss prevention using biometric data|
|US20140353382 *||May 29, 2013||Dec 4, 2014||Ncr Corporation||Security method using an imaging barcode reader|
|US20150060543 *||Sep 3, 2013||Mar 5, 2015||Symbol Technologies, Inc.||Preventing purchased merchandise from being left at a checkout counter|
|US20150127414 *||Mar 14, 2014||May 7, 2015||Catalina Marketing Corporation||System and method for selective auditing of mobile commerce baskets|
|US20150127496 *||Nov 5, 2013||May 7, 2015||At&T Intellectual Property I, L.P.||Methods, Devices and Computer Readable Storage Devices for Tracking Inventory|
|USRE45012||Oct 9, 2013||Jul 15, 2014||MJK Holdings, LLC||Security systems and methods for continuously monitoring the weight of a container|
|WO2014015058A1 *||Jul 17, 2013||Jan 23, 2014||Datalogic ADC, Inc.||Portal data reader indicator light control|
|WO2015044589A1 *||Sep 24, 2014||Apr 2, 2015||Worldline||Method for ordering and distributing a product ordered online|
|U.S. Classification||235/383, 235/385, 705/26.8|
|Cooperative Classification||G06Q30/0633, G06Q10/087|
|European Classification||G06Q10/087, G06Q30/0633|
|Apr 4, 2014||REMI||Maintenance fee reminder mailed|
|Aug 24, 2014||LAPS||Lapse for failure to pay maintenance fees|
|Oct 14, 2014||FP||Expired due to failure to pay maintenance fee|
Effective date: 20140824